mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
synced 2024-11-01 17:08:10 +00:00
496063426d
This easy-to-trigger warning shows up instantly when running Trinity on a kernel with CONFIG_X86_INTEL_MEMORY_PROTECTION_KEYS disabled. At most this should have been a printk, but the -EINVAL alone should be more than adequate indicator that something isn't available. Signed-off-by: Dave Jones <davej@codemonkey.org.uk> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
43 lines
877 B
C
43 lines
877 B
C
#ifndef _LINUX_PKEYS_H
|
|
#define _LINUX_PKEYS_H
|
|
|
|
#include <linux/mm_types.h>
|
|
#include <asm/mmu_context.h>
|
|
|
|
#ifdef CONFIG_ARCH_HAS_PKEYS
|
|
#include <asm/pkeys.h>
|
|
#else /* ! CONFIG_ARCH_HAS_PKEYS */
|
|
#define arch_max_pkey() (1)
|
|
#define execute_only_pkey(mm) (0)
|
|
#define arch_override_mprotect_pkey(vma, prot, pkey) (0)
|
|
#define PKEY_DEDICATED_EXECUTE_ONLY 0
|
|
#define ARCH_VM_PKEY_FLAGS 0
|
|
|
|
static inline bool mm_pkey_is_allocated(struct mm_struct *mm, int pkey)
|
|
{
|
|
return (pkey == 0);
|
|
}
|
|
|
|
static inline int mm_pkey_alloc(struct mm_struct *mm)
|
|
{
|
|
return -1;
|
|
}
|
|
|
|
static inline int mm_pkey_free(struct mm_struct *mm, int pkey)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
static inline int arch_set_user_pkey_access(struct task_struct *tsk, int pkey,
|
|
unsigned long init_val)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
static inline void copy_init_pkru_to_fpregs(void)
|
|
{
|
|
}
|
|
|
|
#endif /* ! CONFIG_ARCH_HAS_PKEYS */
|
|
|
|
#endif /* _LINUX_PKEYS_H */
|